期刊文献+

分布式入侵检测框架 被引量:3

Distributed intrusion detection framework
下载PDF
导出
摘要 现有的网络安全系统往往功能比较单一,难以完成网络系统的整体防护要求,难以保证可靠地提供所需的业务,难以保证业务信息的安全可靠。因此,提出了一个分布式入侵检测框架DIDF,将防火墙、入侵检测和安全事件响应结合起来,实现了一个以管理为核心,具有防范、检测和响应能力的综合安全体系。 The current network security systems are always designed with special technology and function is one-fold. It is difficult to ensure that the network security systems could provide sufficient security for the network and service. Based on this, a distributed intrusion detection framework (DIDF) is built. DIDF integrates firewall, intrusion detection, incident response technologies, and constitutes a security architecture that has management, protection, detection and response abilities.
作者 冯玲 于群
出处 《计算机工程与设计》 CSCD 北大核心 2008年第10期2507-2509,2513,共4页 Computer Engineering and Design
关键词 网络安全 网络安全管理 防火墙 入侵检测 代理 network security network security management firewall intrusion detection agent
  • 相关文献

参考文献6

  • 1张然,钱德沛,张文杰,刘轶,栾钟治.入侵检测技术研究综述[J].小型微型计算机系统,2003,24(7):1113-1118. 被引量:47
  • 2Eugene Schultz,Russell Shumway E.网络安全事件响应[M].段海新,译.北京:人民邮电出版社,2002.
  • 3张然,钱德沛,包崇明,刘轶.基于Multi-agent的入侵检测模型的研究与实现[J].小型微型计算机系统,2003,24(6):995-998. 被引量:7
  • 4Timm Bass. Intrusion detection systems and multi-sensor data fusion[J].Communications of the ACM,2000,43(4):99-105.
  • 5Alfonso Valdes,Keith Skinner. An approach to sensor correlation [C]. Toulouse, France: Recent Advances in Intrusion Detection (RAID),2000.
  • 6Alfonso Valdes,Keith Skinner.Probabilistic alert correlation[C]. Davis,CA,USA:Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection,2001.

二级参考文献16

  • 1An Introduction to Intrusion Detection - Assessment [Z]. ICSA,Inc.
  • 2Nwana H S. Software agents: an overview[J]. Knowledge Engi-neering Review, 1996, 11(3):1-40.
  • 3Jennings N, Sycara K and Wooldridge M. A roadmap of agent research and development [J]. Journal of Autonomous Agents and Multi-Agent Systems, 1998 (1) : 275 - 306.
  • 4Eugenio Oliveira, Klaus Fischer, Olga Stepankova. Multi-agent system: which research for which applications [J]. Robotics and Autonomous System, 1999 (27):91-106.
  • 5Oates,T. Cooperative information gathering: a distributed problem solving approach [R]. Tech. Report TR-94-66, UMASS,1994.
  • 6Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 7Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 8Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 9Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 10Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.

共引文献51

同被引文献17

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部